Search Header Logo

Why are systems attacked? pg 22

Authored by Claire Ferguson

Computers, Other

9th - 10th Grade

Used 3+ times

Why are systems attacked? pg 22
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why systems may be attacked?


"Creating ways to attack systems is highly complex and very challenging. Some individuals view this like completing a puzzle. Some individuals compete for the notoriety in defeating a secured system"

Data and information theft

Personal fun/challenge

Industrial espionage

Financial gain

Disruption

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why systems may be attacked?


"Some businesses or individuals may try to access other businesses' digital systems to steal valuable and private information from a rival business "

Data and information theft

Personal fun/challenge

Industrial espionage

Financial gain

Disruption

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why systems may be attacked?


"Some cyberattacks are motivated by money.

-Get money from a person or business

-Get goods or services without paying

-use of ransomware. Malicious software which is only removed once the victim pays the attacker a ransom payment "

Data and information theft

Personal fun/challenge

Industrial espionage

Financial gain

Disruption

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why systems may be attacked?


"Some individuals, organisations and even countries may seek to prevent an organisation from functioning normally. An example of this is a DoS attack (denial of service attack) "

Data and information theft

Personal fun/challenge

Industrial espionage

Financial gain

Disruption

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why systems may be attacked?


"Many cyberattacks involve stealing customer payment information from online retailers. The information may be used illegally to buy goods and services "

Data and information theft

Personal fun/challenge

Industrial espionage

Financial gain

Disruption

6.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

Ransomware is m _ _ _ _ _ _ _ _ software

7.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

Ransomware is only removed once the victim pays the attacker a ransom p _ _ _ _ _ _

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?